diff --git a/rules/windows/process_creation/win_lolbin_execution_via_winget.yml b/rules/windows/process_creation/win_lolbin_execution_via_winget.yml index a2c43a507..6821201cf 100644 --- a/rules/windows/process_creation/win_lolbin_execution_via_winget.yml +++ b/rules/windows/process_creation/win_lolbin_execution_via_winget.yml @@ -4,9 +4,9 @@ description: Adversaries can abuse winget to download payloads remotely and exec status: experimental references: - https://docs.microsoft.com/en-us/windows/package-manager/winget/install#local-install -author: Sreeman +author: Sreeman, Florian Roth, Frack113 date: 2020/21/04 -modified: 2021/09/12 +modified: 2022/01/11 tags: - attack.defense_evasion - attack.execution @@ -16,10 +16,12 @@ logsource: product: windows detection: selection: - CommandLine|contains|all: 'winget install' + CommandLine|contains|all: + - 'winget' + - 'install' CommandLine|contains: - - ' -m ' - - ' --manifest ' + - '-m ' + - '--manifest' condition: selection falsepositives: - Admin activity installing packages not in the official Microsoft repo. Winget probably won't be used by most users.